scispace - formally typeset
Search or ask a question
Author

Prabin Kumar Panigrahi

Other affiliations: Global University (GU)
Bio: Prabin Kumar Panigrahi is an academic researcher from Indian Institute of Management Indore. The author has contributed to research in topics: Information technology & Business value. The author has an hindex of 6, co-authored 19 publications receiving 98 citations. Previous affiliations of Prabin Kumar Panigrahi include Global University (GU).

Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents a comprehensive review on localization system, problems, principle and approaches for mobile robots, and classify the localization problems in to three categories based on the information of initial position of the robot.

43 citations

Journal ArticleDOI
TL;DR: This study establishes that e-participation initiative by government acts as a mediator in the relation between social media usage by citizen as well as power distance to e-government development.
Abstract: When citizens are actively engaged in e-government processes as co-creators it leads to e-government development. Citizen participation in e-government is a recent phenomenon where government is seeking more involvement of citizens through different platforms. Whether citizens' participation through social media platforms leads to e-government development has been a debate in literature. In this research study, the authors investigate whether social media usage influences government's role in e-government development. Power distance between government and citizen also plays a role in deciding the extent of e-participation in e-government. In this study, the authors examine the relationship between social media, power distance, citizen engagement and e-government development. Using customer focus theory and agency theory, this study establishes that e-participation initiative by government acts as a mediator in the relation between social media usage by citizen as well as power distance to e-government development.

29 citations

Journal ArticleDOI
TL;DR: A research model using personal and environmental factors to understand PLE through the lens of SCT is developed and empirically validates it and it is found that the PLE is positively related to student marks.
Abstract: PurposeThis study extends the literature on the effectiveness of e-learning by investigating the role of student engagement on perceived learning effectiveness (PLE) in the context of Indian higher education. Further, the impact of personal factors (Internet self-efficacy (ISE)) and environmental factors (information, system and service quality parameters) on various dimensions of student engagement (behavioral, emotional and cognitive) is studied through the lens of social cognitive theory (SCT).Design/methodology/approachAn online management information systems (MIS) course is delivered to a batch of 412 postgraduate students. An online survey was conducted to measure the factors affecting their PLE. In addition to the survey, a summative assessment is conducted to evaluate the students in terms of their marks to assess their achievements (actual learning). Covariance-based structural equation modeling (CB-SEM) is used to validate the developed research model.FindingsIt is discovered that the IS (information system) quality parameters (environmental factors) positively impact PLE. The ISE affects the PLE through the mediating effect of all the dimensions of student engagement. Furthermore, there exists a positive relationship between PLE and student marks.Originality/valueThis study develops a research model using personal and environmental factors to understand PLE through the lens of SCT and then empirically validates it. The psychological process from the students' ISE to the PLE is explained through the mediating effects of various dimensions of engagement. Further, it is found that the PLE is positively related to student marks.

24 citations

Journal ArticleDOI
TL;DR: A tool in the form of a roadmap that can enable knowledge sharing among key stakeholders for building a common vision and contribute to planning and implementation of interoperability features of e-government is proposed.
Abstract: Purpose – The purpose of this paper is to propose a tool in the form of a roadmap for planning and implementation of interoperability capabilities. The issue of interoperability is gaining importance for offering services as “one-stop shop” due to rapid developments in the field of e-government in recent times. Several complexities are associated with this important dimension, and there is an urgent need for developing a tool to facilitate rollout of e-government projects with interoperability capabilities. The proposed roadmap can enable knowledge sharing among key stakeholders for building a common vision and contribute to planning and implementation of interoperability features of e-government. Design/methodology/approach – The paper is an exploratory study using the phenomenographic interpretive approach. The literature review identifies the facets and the issues that are crucial for facilitating interoperability. The status of interoperability in some of the developed countries is reviewed where e-go...

20 citations

Journal ArticleDOI
TL;DR: It is found that the size of the social network constituted the critical factor in the association between ICT use and social participation, and social isolation mediates the relationship between the ICTUse and socialparticipation.
Abstract: Researchers have identified social participation for the elderly as a salient activity that benefits their wellbeing. Along that vein, prior studies have reported that ICT use increases the extent to which the elderly participate socially with one another. However, the literature remains silent on the mechanisms by which ICT use leads to social participation. In this paper, we draw on two prominent IS theories, actor-network theory (ANT) and activity theory (AT), to develop a conceptual framework by incorporating four social participation-oriented factors: ICT use, social participation, social isolation, and loneliness. We used a quantitative approach based on the cross-sectional survey to collect data from 240 elderly people. We analyzed the data using structural equation modeling based on SmartPLS 3.0. We found that the size of the social network constituted the critical factor in the association between ICT use and social participation. The outcome of the model suggests that ICT use does not impact the social participation directly. Rather, social isolation (absence of social network) mediates the relationship between the ICT use and social participation. Additionally, loneliness, one of the commonly observed psychological states in the elderly, weakens the influence of ICT use on social isolation. Our research advances our theoretical understanding about social participation among seniors and helps governments and businesses prepare ICT plans for the elderly appropriately.

15 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A mechanism for measuring the influencer index across popular social media platforms including Facebook, Twitter, and Instagram is proposed and findings indicate that engagement, outreach, sentiment, and growth play a key role in determining the influencers.

274 citations

Journal ArticleDOI
TL;DR: This paper aims to provide a comprehensive overview of the challenges that ML techniques face in protecting cyberspace against attacks, by presenting a literature on ML techniques for cyber security including intrusion detection, spam detection, and malware detection on computer networks and mobile networks in the last decade.
Abstract: Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged cyberattacks. Cyber security techniques provide enhancements in security measures to detect and react against cyberattacks. The previously used security systems are no longer sufficient because cybercriminals are smart enough to evade conventional security systems. Conventional security systems lack efficiency in detecting previously unseen and polymorphic security attacks. Machine learning (ML) techniques are playing a vital role in numerous applications of cyber security. However, despite the ongoing success, there are significant challenges in ensuring the trustworthiness of ML systems. There are incentivized malicious adversaries present in the cyberspace that are willing to game and exploit such ML vulnerabilities. This paper aims to provide a comprehensive overview of the challenges that ML techniques face in protecting cyberspace against attacks, by presenting a literature on ML techniques for cyber security including intrusion detection, spam detection, and malware detection on computer networks and mobile networks in the last decade. It also provides brief descriptions of each ML method, frequently used security datasets, essential ML tools, and evaluation metrics to evaluate a classification model. It finally discusses the challenges of using ML techniques in cyber security. This paper provides the latest extensive bibliography and the current trends of ML in cyber security.

135 citations

Posted Content
TL;DR: In this article, the authors discuss the potential impacts of ICTs on welfare, both in terms of potential efficiency gains (via improved arbitrage), and welfare transfers among agents in the supply chain (via reduced informational asymmetries and market power).
Abstract: Information and communications technologies (ICTs) have spread rapidly in the developing world. There has been considerable interest in the potential role ICTs, particularly mobile phones, have begun to play in the marketing of agricultural outputs in these countries. In this paper, we discuss the potential impacts ICTs may have on welfare, both in terms of potential efficiency gains (via improved arbitrage), and welfare transfers among agents in the supply chain (via reduced informational asymmetries and market power). We also review the recent empirical evidence for such effects.

95 citations

Journal ArticleDOI
01 Mar 2021
TL;DR: The role of e-governance in combating COVID-19 by integrating the implications of the China-Pakistan Economic Corridor (CPEC) is investigated in this article, where the authors discuss and analyze the E-Government Development Index (EGDI) reports and rankings issued by the United Nations and big data implications during the COVID19 pandemic.
Abstract: This study’s aim is to investigate the role of e-governance in combating COVID-19 by integrating the implications of the China–Pakistan Economic Corridor (CPEC). We discuss and analyze the E-Government Development Index (EGDI) reports and rankings issued by the United Nations and big data implications during the COVID-19 pandemic. We used the Origin-pro 2018 application for the analysis and discussion. Overall, China’s EGDI ranking has improved from 74 to 65 out of 193 countries, while Pakistan’s ranking has gradually declined from 137 to 148. 5G and other big data technology and e-governance implications have helped to combat the COVID-19 pandemic. In this pandemic scenario, sustainable socioeconomic development in Pakistan needs significant improvement, similar to what has been done by China. We conclude that CPEC can help combat the COVID-19 pandemic because both countries are working together to mitigate social and economic problems. Pakistan should adapt and learn from the Government of China’s experience of successful and proficient e-governance model of technological advancement. This effort will ensure successful CPEC regional extension and help combat the COVID-19 pandemic to ensure Pakistan’s sustainable development.

84 citations